Artwork

Stephan Livera에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Stephan Livera 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
Player FM -팟 캐스트 앱
Player FM 앱으로 오프라인으로 전환하세요!

Dark Skippy: A New Attack on Bitcoin Hardware Wallets? With Nick, Lloyd and Robin SLP597

1:06:04
 
공유
 

Manage episode 434201442 series 2504522
Stephan Livera에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Stephan Livera 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

Dark Skippy is a new attack that in theory, makes it much easier for a malicious person to steal your coins. Listen in to learn about some of the ins and outs here, as well as mitigation and the path forward for the industry from @utxoclub , @LLFOURN & @robin_linus .

  • Why air gapping is not the be all end all

  • Dark Skippy in context with other attacks

  • Security while signing transactions, and security while generating keys

  • RFC6979 Deterministic nonce generation

  • Updating PSBT to help mitigate this attack

Summary

The conversation discusses the ‘Dark Skippy’ attack, a new method for leaking secret keys from a malicious signing device. The attack takes advantage of the nonces used in the Schnorr and ECDSA signature schemes. The new attack vector can potentially extract private keys and seed words from hardware wallets. The attack targets the nonce generation process during key generation and signing. The previous versions of this attack were inefficient, but Dark Skippy improves upon them. The contributors explain how the attack came about and its implications for hardware wallet security. They also discuss the RFC6979 deterministic nonce generation and the concept of anti-klepto signing protocols as mitigations against the attack.

While Dark Skippy is a sophisticated attack, it requires a high level of expertise and is not currently seen in the wild. The discussion highlights the importance of secure boot, upgrading the Partially Signed Bitcoin Transaction (PSBT) process, and improving the randomness of upfront key generation as potential mitigations.

However, it is emphasized that current reputable hardware wallets still provide a high level of security, and there is no immediate action required for users.

Takeaways

  • Dark Skippy is a new attack that leaks secret keys from a malicious signing device.

  • The attack exploits the nonces used in the Schnorr and ECDSA signature schemes.

  • Previous versions of this attack were inefficient, but Dark Skippy improves upon them.

  • Mitigations against the attack include the RFC6979 deterministic nonce generation and anti-klepto signing protocols. Dark Skippy is a sophisticated attack that targets the nonce generation process during key generation and signing.

  • Mitigations for Dark Skippy include implementing secure boot, upgrading the PSBT process, and improving the randomness of upfront key generation.

  • Reputable hardware wallets currently provide a high level of security, and there is no immediate action required for users.

  • The discussion highlights the importance of ongoing research and development to enhance the security of hardware wallets and protect against potential future attacks.

Timestamps:

(00:00) - Intro

(00:45) - What is ‘Dark Skippy’?

(04:39) - Is it an old attack vector? Bitcoin’s security evolving with time

(12:41) - Sponsor

(15:22) - What is a nonce?, RFC6979 Deterministic nonce generation

(22:55) - Common ways of people losing their Bitcoin

(31:08) - Sponsor

(32:07) - Anti-klepto signing protocols; ways to mitigate risks of losing coins

(39:51) - Updating PSBT to help mitigate this attack

(43:26) - The role of Multisig in preventing the attack

(49:57) - Other attack vectors in malicious actor’s toolkit

(56:49) - Summarizing the steps to improve the ecosystem security

(1:00:18) - Closing thoughts

Links:

Sponsors:

Stephan Livera links:

  continue reading

603 에피소드

Artwork
icon공유
 
Manage episode 434201442 series 2504522
Stephan Livera에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Stephan Livera 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

Dark Skippy is a new attack that in theory, makes it much easier for a malicious person to steal your coins. Listen in to learn about some of the ins and outs here, as well as mitigation and the path forward for the industry from @utxoclub , @LLFOURN & @robin_linus .

  • Why air gapping is not the be all end all

  • Dark Skippy in context with other attacks

  • Security while signing transactions, and security while generating keys

  • RFC6979 Deterministic nonce generation

  • Updating PSBT to help mitigate this attack

Summary

The conversation discusses the ‘Dark Skippy’ attack, a new method for leaking secret keys from a malicious signing device. The attack takes advantage of the nonces used in the Schnorr and ECDSA signature schemes. The new attack vector can potentially extract private keys and seed words from hardware wallets. The attack targets the nonce generation process during key generation and signing. The previous versions of this attack were inefficient, but Dark Skippy improves upon them. The contributors explain how the attack came about and its implications for hardware wallet security. They also discuss the RFC6979 deterministic nonce generation and the concept of anti-klepto signing protocols as mitigations against the attack.

While Dark Skippy is a sophisticated attack, it requires a high level of expertise and is not currently seen in the wild. The discussion highlights the importance of secure boot, upgrading the Partially Signed Bitcoin Transaction (PSBT) process, and improving the randomness of upfront key generation as potential mitigations.

However, it is emphasized that current reputable hardware wallets still provide a high level of security, and there is no immediate action required for users.

Takeaways

  • Dark Skippy is a new attack that leaks secret keys from a malicious signing device.

  • The attack exploits the nonces used in the Schnorr and ECDSA signature schemes.

  • Previous versions of this attack were inefficient, but Dark Skippy improves upon them.

  • Mitigations against the attack include the RFC6979 deterministic nonce generation and anti-klepto signing protocols. Dark Skippy is a sophisticated attack that targets the nonce generation process during key generation and signing.

  • Mitigations for Dark Skippy include implementing secure boot, upgrading the PSBT process, and improving the randomness of upfront key generation.

  • Reputable hardware wallets currently provide a high level of security, and there is no immediate action required for users.

  • The discussion highlights the importance of ongoing research and development to enhance the security of hardware wallets and protect against potential future attacks.

Timestamps:

(00:00) - Intro

(00:45) - What is ‘Dark Skippy’?

(04:39) - Is it an old attack vector? Bitcoin’s security evolving with time

(12:41) - Sponsor

(15:22) - What is a nonce?, RFC6979 Deterministic nonce generation

(22:55) - Common ways of people losing their Bitcoin

(31:08) - Sponsor

(32:07) - Anti-klepto signing protocols; ways to mitigate risks of losing coins

(39:51) - Updating PSBT to help mitigate this attack

(43:26) - The role of Multisig in preventing the attack

(49:57) - Other attack vectors in malicious actor’s toolkit

(56:49) - Summarizing the steps to improve the ecosystem security

(1:00:18) - Closing thoughts

Links:

Sponsors:

Stephan Livera links:

  continue reading

603 에피소드

Όλα τα επεισόδια

×
 
Loading …

플레이어 FM에 오신것을 환영합니다!

플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.

 

빠른 참조 가이드